fbpx
Articles

Hacking an Election

One of the dichotomies in the information security landscape is neatly exhibited in a couple of patchwork systems.  Our hodgepodge national data breach notifications laws show the disadvantages of decentralized standards, on the one hand.  Conversely, it is that same type of fragmentation that provides a substantial benefit when it comes time for us to… Read More

CyberSecurity – fact or fiction?

Our world seems to be rapidly transforming into the vision Masamune Shirow had when he began the story of Ghost in the Shell in 1989.  We’re arriving even faster than the story’s mid-21st century setting—which just so happens to be our near future.  The first of an eventual franchise, the original Japanese manga created a world… Read More

Gotta catch ’em all — all security risks, that is

I was asked last week if I could do an article on Pokemon Go, the biggest Pokemon-related phenomenon since the original games took the world by storm in the late 1990’s.  It’s been a long time since I donned the trainer hat and went on my journey to catch ‘em all…Pikachu, Charizard…Dagut…Shoe… Takes me back…. Read More

Brexit Won’t Exempt UK From EU Data Regulations

Britain may be eager to extricate itself from the European Union and forge ahead on its own, but as it happens, a stage left Brexit will not exempt firms in the UK from adherence to the impending data security reform, set to take effect across the continent in two years.  Yes, in 2018, the General… Read More

360 million passwords show dangerous online landscape

This “Peace” hacker is really making a name for him or herself.  A username, that is.  First LinkedIn, now MySpace.  You remember, MySpace?  The social networking equivalent of those cave paintings at Lascaux.  Eight years ago online certainly seems like prehistory, and it was that amount of time that the site last reigned supreme, boasting… Read More

Fighting the Real Threat in Cybersecurity

Despite ongoing differences, there is one thing both retailers and the financial sector can agree on: Winter is coming.  For cybersecurity, it may even already be here.  The exponential increase of data breaches and the like has put every industry at heightened risk over the last few years, and continues to do so.  Unlike the… Read More

Hacking any & everything that moves – don’t drink the water

It bears repeating that one of the most major concerns about cyber crime is how it poses a critical risk to our national infrastructure, if such systems are left unprotected.  Systems that, without the proper security, could be co-opted by hackers to, say, alter the chemicals in the flow of a water treatment plant.  This… Read More

NetLib Releases Next Generation Data Security Platform at RSA Conference 2016

New Enterprise Manager Delivers Limitless Global Encryption Management for Physical, Virtual and Cloud Environments STAMFORD, CT, February 29, 2016 – RSA Conference – NetLib, a pioneer in data security, today announced the release of Enterprise Manager for their flagship product NetLib Encryptionizer for SQL Server. An innovative security solution, Enterprise Manager enables organizations of all… Read More

That’s Not Dell Calling

There’s some sort of shadiness going on over at Dell.  Several users in recent weeks have reported being contacted by people claiming to be Dell technicians, who say they have found a problem with the customer’s computer and offer to fix it.  Ordinarily, the best response to this is just to hang up the phone. … Read More

U.S. counter ‘intelligence’ on backdoor encryption

Teen hacker is at it again.  If you recall, back in October, the email account of indignant CIA director John Brennan was infiltrated.  The culprit claimed to be a high school student (or several), and, merely posing as a Verizon technician, he was able to gain access to Brennan’s personal information, and take control of… Read More

Top